An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidance.

Adoption of the Domain-based Message Authentication, Reporting & Conformance - or DMARC - standard is very low in the healthcare sector, and broader use could greatly reduce phishing risks, according to a new study.

Ransomware is on its way to becoming a $1 billion industry, by some estimates, and possibly 50 percent of enterprises have dealt with it so far. Darius Goodall of Barracuda discusses the best way to defend against the newest strains.
Download this interview transcript and learn about:
The drivers behind ransomware...

Opportunistic attackers may have breached some Parliament email accounts by brute-force guessing their way into accounts with weak passwords. But such a breach is hardly the "cyberattack" some are making it out to be.

Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session will review why email spoofing...

Despite the proliferation of social networks and messaging apps, email remains the primary means of communication today. Unfortunately, it also remains a persistent threat vector for cybersecurity abuse. We see these evil emails everywhere: at work, at home and in the news, attempting to sell something, or steal...

Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...

The best approach to building a security policy is by using a comprehensive, layered approach that covers all threats (both new and known). This policy needs to leverage real-time threat intelligence by addressing all threat vectors and all platform types as workloads migrate from physical to virtual to...

When confronted with a scenario where backup have failed and weeks of work may be lost due to ransomware, does your organization know how to respond:
Download this infographic and learn:
What IT professionals rank as the most effective way to prevent ransomware;
How many ransomware attacks occur daily;
The top...

The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...

Brand and professional reputations can be damaged beyond repair by a successful ransomware or phishing attack. So how can organizations stay protected from advanced persistent cyber threats?
Download this checklist to learn how to:
Effectively secure cloud or SaaS-based applications;
Educate your users;
Detect...

When Hayward Tyler, a UK-based global manufacturing firm, suffered a Cryptolocker ransomware attack, the company had contracts still in negotiation, confidential customer data and trade secrets encrypted by cyber criminals. However, within just one hour of discovering the ransomware, they were able to identify all the...

"No More Ransom," a coalition made up of the Dutch High Tech Crime police, Europol's Cybercrime Centre, and a growing number of cyber security companies, was formed to address the rapid growth of cybercrime conducted through ransomware.
The coalition knew their website would be an irresistible target for cyber...

A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 - a 300% increase over the 1,000 daily ransomware attacks reported in 2015.
What does this mean for small to medium-sized businesses? In order to protect your organisation, you...

Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session will review why email spoofing...